ARTICLES

How Hackers Hacked WhatsApp Through Missed Calls

Recently, hackers compromised WhatsApp security through the process of missed call. Read on know how the hackers compromised WhatsApp users... Recently, hackers compromised WhatsApp security...

Understanding Zero-Day Attacks

Zero-Day attacks is a hard reality that is almost impossible to stop. However, organizations can minimize the attacks by strategies. Read on to more...

Why the Latest Versions of UC Browser Android Apps are Vulnerable

The latest versions of UC Browser and UC Browser Mini Android apps are vulnerable to spoofing attacks. Read on to know more about it... Since...

How the New Variant of Dharma Ransomware Trick Users

The new Dharma Ransomware is out on the loose and is evolving with time. Read on to know more about this latest ransomware... Over the...

NEWS

Record level of vulnerabilities sparks cybersecurity innovation among global enterprises

New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat...

Microsoft alerts for WannaCry-like exploit

Source: ETCIO Microsoft alerts for WannaCry-like exploit, releases Windows patches Microsoft’s decision of patching older Windows’ versions suggest the possibility of an exploit on a global...

Bug in Twitter led to collection and sharing of users’ geolocation...

Source: Cyware | By Ryan Stewart Bug in Twitter led to collection and sharing of users’ geolocation data with its partner • Twitter inadvertently collected and...

April 2019’s Most Wanted – Malware Cyber Criminals Up to Old...

Check Point's researchers confirm the return of the Trickbot multi-purpose banking trojan to its top 10 most wanted malware list after two years Check Point...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...

EVENTS

RSA Conference 2019 – Asia Pacific & Japan

RSA Conference 2019 Asia Pacific & Japan Marina Bay Sands | Singapore 16 – 18 July As the region's leading cybersecurity event, RSA Conference 2019 Asia Pacific...